Thales demystifies encryption and key management at RSA 2013

Thales,
leader in information systems and communications security, will be
showcasing its line of high assurance solutions for data protection and
cyber security at this year’s RSA
Conference, San Francisco, February 25 – March 1, 2013.

Come to our booth #517 for a hands-on experience with a genuine World
War II Enigma machine and compare key management practices of yesterday
and today! Strong encryption and key management are cornerstones of
today’s IT infrastructures and Thales will be demonstrating its latest
solutions for:

Enterprise class key management

Thales is again participating in the OASIS showcase, highlighting the
Key Management Interoperability Protocol (KMIP)
standard, with its high assurance enterprise-class key management
solution – keyAuthority.
The demonstration highlights the comprehensive capabilities of the
Thales solution in the context of a variety of encryption devices from
other participants in the KMIP interoperability booth. In addition,
Thales key management experts will be available to discuss the evolution
of the KMIP standard and the contribution of Thales as an originating
author of the KMIP specification.

Cloud data protection

Strong encryption and key management are recognized as the most secure
and effective way of protecting data and that applies equally to the cloud
as in it does the enterprise. In order for organizations to take up
cloud services and migrate sensitive and high-value data to virtualized
and cloud deployments, they need a high assurance, reliable key
management solution that allows them to retain control of their keys,
and therefore their data. The Thales portfolio protects critical data
assets throughout their lifecycle – when in storage, passing over
communications networks and while in use by business applications – all
of which are vital aspects of a cloud security strategy.

Code signing

The growth of advanced persistent threats (APTs) such as Stuxnet and
Duqu, the increase in cloud-based services and the smartphone and tablet
revolution all place pressure on software producers to ensure the
integrity and authenticity of their code. Code
signing is used not only by software publishers but by all types of
organizations writing software and firmware. It enables those installing
software to validate that it has not changed since it was published and
also to verify the identity of the publisher. A critical and fundamental
element of the security of any code signing process, just as with any
PKI-based technology, is protection of the confidentiality of the
private key used to create the digital signature. Thales HSMs provide
tamper-resistant, certified protection for private code signing keys,
and our code
signing solution offers flexible automation capabilities to simplify
code signing request/approval workflows for organizations with more
complex environments.

New Global Encryption Trends Study

Thales is releasing the 8th edition of its annual research report - the
Global Encryption Trends Study.

CIO, CTO & Developer Resources

The study, which is produced in conjunction with the Ponemon Institute,
is based on a survey of more than 4,000 business and IT managers from
around the world regarding the use of encryption, how it has evolved and
its effect on the security posture of an organization. It focuses on the
compliance pressures and cyber attacks targeting sensitive data and how
and where different types of organizations are deploying encryption as a
result.

Thales and Larry Ponemon of the Ponemon Institute discuss the results of
the latest Global Encryption Trends Study, Wednesday, February 27, 2012
at “W” San Francisco Hotel 12 noon – 1.30pm. Click
here to register (this is a registration only event).

Thales e-Security is a leading global provider of data encryption and
cyber security solutions to the financial services, high technology,
manufacturing, government and technology sectors. With a 40-year track
record of protecting corporate and government information, Thales
solutions are used by four of the five largest energy and aerospace
companies, 22 NATO countries, and secure more than 80 percent of
worldwide payment transactions. Thales e-Security has offices in
Australia, France, Hong Kong, Norway, United States and the United
Kingdom. www.thales-esecurity.com

About Thales

Thales is a global technology leader for the defence & security and the
aerospace & transport markets. In 2011 the company generated revenues of
€13 billion with 67,000 employees in 56 countries. With its 22,500
engineers and researchers, Thales has a unique capability to design,
develop and deploy equipment, systems and services that meet the most
complex security requirements. Thales has an exceptional international
footprint, with operations around the world working with customers and
local partners. www.thalesgroup.com

"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.

In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...

In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.

Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself.
Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, discussed how VPaaS enables you to move fast, creating scalable video experiences that reach your aud...

All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud.
In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...

"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.

What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...

An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen.
In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for ...

IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effici...

Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation.
In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...

The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location.
With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...

The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...

"MathFreeOn.com is a line coding platform for engineers and scientists. When they want to solve an engineering problem and they have to use software - they have to pay a lot of money for licenses - but with MathFreeOn you don't have to pay a lot of money. Just go to our site and write the code and you can check the result right away," explained Simon Lee, CMO of MathFreeOn, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Cla...

You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time.
In his session at 19th Cloud Expo, Mark Allen, General Manager of...

In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...

Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...

As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...

In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, provideed economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session also included a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.

"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.

Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases.
In his general session at @ThingsExpo, Dave McCarthy, Director of Products...

For large enterprise organizations, it can be next-to-impossible to identify attacks and act to mitigate them in good time. That’s one of the reasons executives often discover security breaches when an external researcher — or worse, a journalist — gets in touch to ask why hundreds of millions of logins for their company’s services are freely available on hacker forums.
The huge volume of incoming connections, the heterogeneity of services, and the desire to avoid false positives leave enterprise security teams in a difficult spot. Finding potential security breaches is like finding a tiny ne...

When was the last time you’ve ever heard anyone say “IT Applications & Operations”? Frankly, in my 30+ year career in IT, I don’t believe I’ve ever heard anyone use this term. The typical term we hear is IT Infrastructure & Operations. These two go together like Peanut Butter and Jelly, which tells us a lot about how we view the field of IT. For those that may not be familiar with the role of IT Operations, Joe Hertvik does a great job here of describing IT Operations Management as someone engaged in the role of providing this service to the business. As you can see it’s very interesting how ...

Information self-service is undoubtedly one of the main drivers of Modern Data Management. From “data services marketplaces” to “self-service Big Data analytics,” one of the objectives of most data-related initiatives today is to provide business professionals with new ways to solve their information needs with the goals of achieving self-reliance and minimizing the IT bottleneck. However, is it realistic to expect business users to assume this job?
Studies [1] report that more than 60 percent of companies grade their experience with self-service initiatives as “average” or lower, with nearl...

Monitoring of Docker environments is challenging. Why? Because each container typically runs a single process, has its own environment, utilizes virtual networks, or has various methods of managing storage. Traditional monitoring solutions take metrics from each server and applications they run. These servers and applications running on them are typically very static, with very long uptimes. Docker deployments are different: a set of containers may run many applications, all sharing the resources of one or more underlying hosts. It's not uncommon for Docker servers to run thousands of short-te...

The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location.
With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal today!

We've come across a lot of talk about "cloud-native" apps lately. (They even have their own foundation!) Developers build these apps specifically to run on a cloud-based infrastructure, with the kind of user interface we all expect from our apps now. Cloud-native applications are scalable, usable and flexible, usually packaged using containers.
It's a step further in the cloud computing journey, and a step away from the way we used to conceive of apps. Application development happened for many years inside an IT bubble, with a long development and deployment lifecycle. They were used only i...

The IoT continued its toddler-like growth and stumbles in 2016. Here are five trends to look for in 2017 as the IoT enters its adolescence and how to benefit from them.
1. Ecosystems begin to determine winners and losers
Previously these were nice in-the-future concerns; now they will really count. Filling out a whole product value proposition through partnerships has repeatedly proven its importance across B2B and enterprise software sectors. In the IoT, they will be even more critical.

The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen.
8 Predictions About How the Security Industry Will Fare in 2017 – An eWeek slideshow looking at areas like IoT, ransomware, automated attacks and the security skills shortage in the industry. Chris Preimesberger (@editingwhiz), who does a monthly #eweekchat on twitter, covers many of the worries facing organizations.

Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2017' as Conference Chair
The @DevOpsSummit at Cloud Expo will take place on June 6-8, 2017, at the Javits Center in New York City, NY.
"DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great team at @DevOpsSummit and Cloud Expo tell the world how they can leverage this emerging disruptive tr...

I recently recovered from ACDF surgery where they remove a herniated or degenerative disc in the neck and fuse the cervical bones above and below the disk. My body had a huge vulnerability where one good shove or fender bender could have ruptured my spinal cord. I had some items removed and added some hardware and now my risk of injury is greatly reduced.
Breaches are occurring at a record pace, botnets are consuming IoT devices and bandwidth, and the cloud is becoming a de-facto standard for many companies. Vulnerabilities are often found at the intersection of all three of these trends, so ...

In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain.
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management...

Nerdio is an IT-as-a-service platform with virtual desktop infrastructure (VDI) technology at its core. It is designed for IT departments that need a way to easily manage their ever-increasing workloads. Nerdio allows users to efficiently manage their complete IT environments by giving them full visibility and control of users’ desktops. In addition to virtual desktops, the platform includes unlimited virtual servers, Microsoft Office 365 security, and disaster recovery and 24/7/365 support.

Reality itself is going through a digital transformation thanks to leaps in 3D rendering and the crunch-speed motion feedback data. Although the modern definition of virtual reality (VR) has been making promises for three decades, the emphasis was always on the potential. Now it’s here. This is a tour of the state of VR in 2016 and where developers are taking it as VR spreads far beyond the world of gaming.

We have been seeing a sudden rise in the deployment of Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL). It looks like the long “AI winter” is finally over. It is interesting to note that AI was mentioned by Alan Turing in a paper he wrote back in 1950 to suggest that there is possibility to build machines with true intelligence. Then in 1956, John McCarthy organized a conference at Dartmounth and coined the phrase Artificial Intelligence. Much of the next three decades did not see much activity and hence the phrase “AI Winter” was coined. Around 1997, IBM’s Deep Blu...

Cyberattacks are relentless. The pace of attacks shows no sign of slowing, and organizations understand that 100 percent prevention of attacks is not possible. Traditional prevention and detection techniques are falling short, and security professionals are scrambling for new paradigms that can more effectively detect attacks and mitigate the growing levels of damage. In this climate of confusion, deception-based solutions offer a viable and proven way to stop attackers in their tracks. Why? Because instead of sitting back and waiting to be the victim, detection technologies let organizations ...

Cloud computing budgets worldwide are reaching into the hundreds of billions of dollars, and no organization can survive long without some sort of cloud migration strategy. Each month brings new announcements, use cases, and success stories.